Typosquatting consists of registering Internet domain names that closely resemble legitimate, reputable, and well-known ones (e.g., Farebook instead of Facebook). This cyber-attack aims to distribute malware or to phish the victims users (i.e., stealing their credentials) by mimicking the aspect of the legitimate webpage of the targeted organisation. The majority of the detection approaches proposed so far generate possible typo-variants of a legitimate domain, creating thus blacklists which can be used to prevent users from accessing typo-squatted domains. Only few studies have addressed the problem of Typosquatting detection by leveraging a passive Domain Name System (DNS) traffic analysis. In this work, we follow this approach, and addit...
Phishing is social engineering attack that inflicts damages of several billion dollars each year. Ph...
Malware typically uses Domain Generation Algorithms (DGAs) as a mechanism to contact their Command a...
Over the last fifteen years, several types of attacks against domain names and the companies relying...
Typosquatting consists of registering Internet domain names that closely resemble legitimate, reputa...
Inexpensive and simple domain name registrations foster a wide variety of abuse. One of the most com...
The nefarious practice of Typosquatting involves deliberately registering Internet domain names cont...
The domain name service (DNS) plays an important role in the operation of the Internet, providing a ...
On the Internet and other IP networks, the Domain Name System (DNS) is used to identify machines. Re...
On the Internet and other IP networks, the Domain Name System (DNS) is used to identify machines. Re...
Typosquatting is the act of purposefully registering a domain name that is a mistype of a popular do...
Abstract—Typosquatting is the act of purposefully registering a domain name that is a mistype of a p...
Botnets are one of the major cyber infections used in several criminal activities. In most botnets, ...
Typo-squatting domains are a common cyber-attack technique. It involves utilising domain names, that...
Malicious domain names have long been pervasive in the global DNS (Domain Name System) infrastructur...
Automatic detection of algorithmically generated domains (AGDs) is a crucial element for fighting Bo...
Phishing is social engineering attack that inflicts damages of several billion dollars each year. Ph...
Malware typically uses Domain Generation Algorithms (DGAs) as a mechanism to contact their Command a...
Over the last fifteen years, several types of attacks against domain names and the companies relying...
Typosquatting consists of registering Internet domain names that closely resemble legitimate, reputa...
Inexpensive and simple domain name registrations foster a wide variety of abuse. One of the most com...
The nefarious practice of Typosquatting involves deliberately registering Internet domain names cont...
The domain name service (DNS) plays an important role in the operation of the Internet, providing a ...
On the Internet and other IP networks, the Domain Name System (DNS) is used to identify machines. Re...
On the Internet and other IP networks, the Domain Name System (DNS) is used to identify machines. Re...
Typosquatting is the act of purposefully registering a domain name that is a mistype of a popular do...
Abstract—Typosquatting is the act of purposefully registering a domain name that is a mistype of a p...
Botnets are one of the major cyber infections used in several criminal activities. In most botnets, ...
Typo-squatting domains are a common cyber-attack technique. It involves utilising domain names, that...
Malicious domain names have long been pervasive in the global DNS (Domain Name System) infrastructur...
Automatic detection of algorithmically generated domains (AGDs) is a crucial element for fighting Bo...
Phishing is social engineering attack that inflicts damages of several billion dollars each year. Ph...
Malware typically uses Domain Generation Algorithms (DGAs) as a mechanism to contact their Command a...
Over the last fifteen years, several types of attacks against domain names and the companies relying...